{"id":"https://openalex.org/W6884616884","doi":"https://doi.org/10.1109/tifs.2025.3555410","title":"Compromising LLM Driven Embodied Agents With Contextual Backdoor Attacks","display_name":"Compromising LLM Driven Embodied Agents With Contextual Backdoor Attacks","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W6884616884","doi":"https://doi.org/10.1109/tifs.2025.3555410"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3555410","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3555410","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Aishan Liu","orcid":"https://orcid.org/0000-0002-4224-1318"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Aishan Liu","raw_affiliation_strings":["State Key Laboratory of Complex and Critical Software Environment (SKLCCSE) and the School of Computer Science and Engineering (SCSE), Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Complex and Critical Software Environment (SKLCCSE) and the School of Computer Science and Engineering (SCSE), Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yuguang Zhou","orcid":"https://orcid.org/0000-0001-5069-4563"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuguang Zhou","raw_affiliation_strings":["State Key Laboratory of Complex and Critical Software Environment (SKLCCSE) and the School of Computer Science and Engineering (SCSE), Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Complex and Critical Software Environment (SKLCCSE) and the School of Computer Science and Engineering (SCSE), Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xianglong Liu","orcid":"https://orcid.org/0000-0001-8425-4195"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianglong Liu","raw_affiliation_strings":["State Key Laboratory of Complex and Critical Software Environment (SKLCCSE) and the School of Computer Science and Engineering (SCSE), Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Complex and Critical Software Environment (SKLCCSE) and the School of Computer Science and Engineering (SCSE), Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Tianyuan Zhang","orcid":"https://orcid.org/0000-0001-9874-6828"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianyuan Zhang","raw_affiliation_strings":["State Key Laboratory of Complex and Critical Software Environment (SKLCCSE) and the School of Computer Science and Engineering (SCSE), Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Complex and Critical Software Environment (SKLCCSE) and the School of Computer Science and Engineering (SCSE), Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Siyuan Liang","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Siyuan Liang","raw_affiliation_strings":["School of Computing, National University of Singapore, Queenstown, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computing, National University of Singapore, Queenstown, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jiakai Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiakai Wang","raw_affiliation_strings":["Zhongguancun Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Zhongguancun Laboratory, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yanjun Pu","orcid":"https://orcid.org/0000-0001-6154-1247"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yanjun Pu","raw_affiliation_strings":["Zhongguancun Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Zhongguancun Laboratory, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Tianlin Li","orcid":"https://orcid.org/0000-0002-2207-1622"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Tianlin Li","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore"],"affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Junqi Zhang","orcid":"https://orcid.org/0009-0001-4733-023X"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junqi Zhang","raw_affiliation_strings":["School of Cyberspace Security, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Wenbo Zhou","orcid":"https://orcid.org/0000-0002-4703-4641"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbo Zhou","raw_affiliation_strings":["School of Cyberspace Security, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Qing Guo","orcid":"https://orcid.org/0000-0003-0974-9299"},"institutions":[{"id":"https://openalex.org/I115228651","display_name":"Agency for Science, Technology and Research","ror":"https://ror.org/036wvzt09","country_code":"SG","type":"government","lineage":["https://openalex.org/I115228651"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Qing Guo","raw_affiliation_strings":["Agency for Science, Technology and Research (A*STAR), Fusionopolis, Singapore"],"affiliations":[{"raw_affiliation_string":"Agency for Science, Technology and Research (A*STAR), Fusionopolis, Singapore","institution_ids":["https://openalex.org/I115228651"]}]},{"author_position":"last","author":{"id":null,"display_name":"Dacheng Tao","orcid":"https://orcid.org/0000-0001-7225-5449"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Dacheng Tao","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore"],"affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":12,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":16.4979,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.98918211,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"20","issue":null,"first_page":"3979","last_page":"3994"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.7113000154495239,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.7113000154495239,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.030899999663233757,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.025499999523162842,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9405999779701233},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7305999994277954},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.6944000124931335},{"id":"https://openalex.org/keywords/embodied-cognition","display_name":"Embodied cognition","score":0.6622999906539917},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5426999926567078},{"id":"https://openalex.org/keywords/safer","display_name":"SAFER","score":0.47130000591278076},{"id":"https://openalex.org/keywords/robot","display_name":"Robot","score":0.4259999990463257},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42089998722076416}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9405999779701233},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8463000059127808},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7305999994277954},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.6944000124931335},{"id":"https://openalex.org/C100609095","wikidata":"https://www.wikidata.org/wiki/Q1335050","display_name":"Embodied cognition","level":2,"score":0.6622999906539917},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.5893999934196472},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5426999926567078},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5213000178337097},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.47130000591278076},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.4259999990463257},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42089998722076416},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38589999079704285},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.3734000027179718},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.3646000027656555},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.3476000130176544},{"id":"https://openalex.org/C103683099","wikidata":"https://www.wikidata.org/wiki/Q5370102","display_name":"Embodied agent","level":3,"score":0.32499998807907104},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.32420000433921814},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.3172999918460846},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.2989000082015991},{"id":"https://openalex.org/C2776207758","wikidata":"https://www.wikidata.org/wiki/Q5303302","display_name":"Downstream (manufacturing)","level":2,"score":0.29499998688697815},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.2782000005245209},{"id":"https://openalex.org/C193856179","wikidata":"https://www.wikidata.org/wiki/Q5251100","display_name":"Defeasible estate","level":2,"score":0.2694999873638153}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3555410","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3555410","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4126030504703522,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3289033975","display_name":null,"funder_award_id":"20230017051001","funder_id":"https://openalex.org/F4320327472","funder_display_name":"Chinese Aeronautical Establishment"},{"id":"https://openalex.org/G489730147","display_name":null,"funder_award_id":"62206009","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327472","display_name":"Chinese Aeronautical Establishment","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W2741631785","https://openalex.org/W2753783305","https://openalex.org/W2799002257","https://openalex.org/W2963250244","https://openalex.org/W2963518342","https://openalex.org/W2985913519","https://openalex.org/W3007769740","https://openalex.org/W3047056580","https://openalex.org/W3104118091","https://openalex.org/W3109409894","https://openalex.org/W3198685994","https://openalex.org/W3200811579","https://openalex.org/W3202717607","https://openalex.org/W4211039052","https://openalex.org/W4221143046","https://openalex.org/W4312044266","https://openalex.org/W4320560161","https://openalex.org/W4383108457","https://openalex.org/W4384027004","https://openalex.org/W4385567149","https://openalex.org/W4385570045","https://openalex.org/W4385571453","https://openalex.org/W4385574139","https://openalex.org/W4386065691","https://openalex.org/W4388857970","https://openalex.org/W4388867373","https://openalex.org/W4389421595","https://openalex.org/W4389519829","https://openalex.org/W4391696889","https://openalex.org/W4401042878","https://openalex.org/W4401043416","https://openalex.org/W4402754214","https://openalex.org/W4404782283","https://openalex.org/W4404782964","https://openalex.org/W4406731455","https://openalex.org/W4406882309","https://openalex.org/W6743581629","https://openalex.org/W6746897123","https://openalex.org/W6780120029","https://openalex.org/W6784558051","https://openalex.org/W6796161053","https://openalex.org/W6810595431","https://openalex.org/W6810738896","https://openalex.org/W6810889274","https://openalex.org/W6850054432","https://openalex.org/W6852874933","https://openalex.org/W6854866820","https://openalex.org/W6854929498","https://openalex.org/W6855083434","https://openalex.org/W6859173201","https://openalex.org/W6860041859","https://openalex.org/W6861479177","https://openalex.org/W6862190762","https://openalex.org/W6863208875","https://openalex.org/W6872230664"],"related_works":[],"abstract_inverted_index":{"Large":[0],"language":[1,40],"models":[2],"(LLMs)":[3],"have":[4],"transformed":[5],"the":[6,26,50,88,119,131,160,186,200,225,249],"development":[7],"of":[8,30,43,91,190,202,215,227,252,275,293],"embodied":[9,54,221,277],"intelligence.":[10],"By":[11,77],"providing":[12],"a":[13,60,70,80,92,163,179],"few":[14,81],"contextual":[15,82,89,133,263],"demonstrations":[16],"(such":[17],"as":[18,49],"rationales":[19],"and":[20,68,114,188,195,218,242,299],"solution":[21],"examples)":[22],"developers":[23],"can":[24,85,112],"utilize":[25],"extensive":[27,232],"internal":[28],"knowledge":[29],"LLMs":[31,284],"to":[32,97,140,153,290],"effortlessly":[33],"translate":[34],"complex":[35],"tasks":[36],"described":[37],"in":[38,125,162,174,220,267],"abstract":[39],"into":[41],"sequences":[42],"code":[44,298],"snippets,":[45],"which":[46],"will":[47],"serve":[48],"execution":[51,189],"logic":[52],"for":[53,273],"agents.":[55,222],"However,":[56],"this":[57,66,268,294],"paper":[58,288],"uncovers":[59],"significant":[61],"backdoor":[62,264],"security":[63],"threat":[64,265],"within":[65],"process":[67],"introduces":[69],"novel":[71],"method":[72],"called":[73],"Contextual":[74],"Backdoor":[75],"Attack.":[76],"poisoning":[78],"just":[79],"demonstrations,":[83,143],"attackers":[84],"covertly":[86],"compromise":[87,130,212],"environment":[90],"closed-box":[93],"LLM,":[94],"prompting":[95],"it":[96],"generate":[98],"programs":[99,104],"with":[100],"context-dependent":[101,172],"defects.":[102],"These":[103],"appear":[105],"logically":[106],"sound":[107],"but":[108],"contain":[109],"defects":[110,192],"that":[111,157,183,211,280],"activate":[113],"induce":[115],"unintended":[116],"behaviors":[117,173],"when":[118],"operational":[120],"agent":[121],"encounters":[122],"specific":[123],"triggers":[124],"its":[126],"interactive":[127],"environment.":[128],"To":[129,170,223],"LLM\u2019s":[132],"environment,":[134],"we":[135,177,230,247],"employ":[136],"adversarial":[137,165],"in-context":[138],"generation":[139,187],"optimize":[141],"poisoned":[142,150],"where":[144],"an":[145,154],"LLM":[146,156],"judge":[147],"evaluates":[148],"these":[149],"prompts,":[151],"reporting":[152],"additional":[155],"iteratively":[158],"optimizes":[159],"demonstration":[161],"two-player":[164],"game":[166],"using":[167],"chain-of-thought":[168],"reasoning.":[169,245],"enable":[171],"downstream":[175,276],"agents,":[176,278],"implement":[178],"dual-modality":[180],"activation":[181],"strategy":[182],"controls":[184],"both":[185],"program":[191,208],"through":[193],"textual":[194],"visual":[196,244],"triggers.":[197],"We":[198],"expand":[199],"scope":[201],"our":[203,228,253],"attack":[204],"by":[205,255],"developing":[206],"five":[207],"defect":[209],"modes":[210],"key":[213],"aspects":[214],"confidentiality,":[216],"integrity,":[217],"availability":[219],"validate":[224],"effectiveness":[226],"approach,":[229],"conducted":[231],"experiments":[233],"across":[234],"various":[235],"tasks,":[236],"including":[237],"robot":[238,240],"planning,":[239],"manipulation,":[241],"compositional":[243],"Additionally,":[246],"demonstrate":[248],"potential":[250],"impact":[251],"approach":[254],"successfully":[256],"attacking":[257],"real-world":[258],"autonomous":[259],"driving":[260],"systems.":[261],"The":[262],"introduced":[266],"study":[269],"poses":[270],"serious":[271],"risks":[272],"millions":[274],"given":[279],"most":[281],"publicly":[282],"available":[283,302],"are":[285,301],"third-party-provided.":[286],"This":[287],"aims":[289],"raise":[291],"awareness":[292],"critical":[295],"threat.":[296],"Our":[297],"demos":[300],"at":[303],"<uri":[304],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[305],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">https://contextual-backdoor.github.io/</uri>.":[306]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
